{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T18:25:44Z","timestamp":1761675944144},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642291005"},{"type":"electronic","value":"9783642291012"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-29101-2_11","type":"book-chapter","created":{"date-parts":[[2012,4,2]],"date-time":"2012-04-02T00:10:23Z","timestamp":1333325423000},"page":"158-169","source":"Crossref","is-referenced-by-count":9,"title":["Towards Fine-Grained Access Control on Browser Extensions"],"prefix":"10.1007","author":[{"given":"Lei","family":"Wang","sequence":"first","affiliation":[]},{"given":"Ji","family":"Xiang","sequence":"additional","affiliation":[]},{"given":"Jiwu","family":"Jing","sequence":"additional","affiliation":[]},{"given":"Lingchen","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"11_CR1","unstructured":"SOP: The Same-Origin Policy (August 2001), \n                    \n                      http:\/\/www.mozilla.org\/projects\/security\/components\/same-origin.html"},{"key":"11_CR2","unstructured":"Amo: Addons.mozilla.org, \n                    \n                      https:\/\/addons.mozilla.org"},{"key":"11_CR3","unstructured":"Djeric, V., Goel, A.: Securing script-based extensibility in web browsers. In: USENIX Security (2010)"},{"key":"11_CR4","doi-asserted-by":"crossref","unstructured":"Dhawan, M., Ganapathy, V.: Analyzing information flow in JavaScript-based browser extensions. In: 2009 Annual Computer Security Applications Conference, pp. 382\u2013391. IEEE (2009)","DOI":"10.1109\/ACSAC.2009.43"},{"key":"11_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-73614-1_1","volume-title":"Detection of Intrusions and Malware, and Vulnerability Assessment","author":"M. Ter Louw","year":"2007","unstructured":"Ter Louw, M., Lim, J.S., Venkatakrishnan, V.N.: Extensible Web Browser Security. In: H\u00e4mmerli, B.M., Sommer, R. (eds.) DIMVA 2007. LNCS, vol.\u00a04579, pp. 1\u201319. Springer, Heidelberg (2007)"},{"issue":"3","key":"11_CR6","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1007\/s11416-007-0078-5","volume":"4","author":"M. Louw Ter","year":"2008","unstructured":"Ter Louw, M., Lim, J.S., Venkatakrishnan, V.N.: Enhancing web browser security against malware extensions. Journal in Computer Virology\u00a04(3), 179\u2013195 (2008)","journal-title":"Journal in Computer Virology"},{"key":"11_CR7","unstructured":"Barth, A., Felt, A., Saxena, P., Boodman, A.: Protecting browsers from extension vulnerabilities. In: Proceedings of the 17th Network and Distributed System Security Symposium (NDSS), San Diego, CA, Citeseer (2010)"},{"key":"11_CR8","unstructured":"Review process of mozilla, \n                    \n                      https:\/\/addons.mozilla.org\/en-US\/developers\/docs\/policies\/reviews"},{"key":"11_CR9","unstructured":"Add-on reviews, \n                    \n                      https:\/\/wiki.mozilla.org\/AMO:Editors\/EditorGuide\/AddonReviews"},{"key":"11_CR10","unstructured":"Ffsniff: Firefox sniffer (June 2008), \n                    \n                      http:\/\/azurit.elbiahosting.sk\/ffsniff"},{"key":"11_CR11","unstructured":"Building an firefox extension, \n                    \n                      https:\/\/developer.mozilla.org\/en\/Building_an_Extension"},{"key":"11_CR12","unstructured":"Mozilla xpconnect, \n                    \n                      https:\/\/developer.mozilla.org\/en\/XPConnect"},{"key":"11_CR13","unstructured":"Mozilla addons blocklist, \n                    \n                      http:\/\/www.mozilla.com\/en-US\/blocklist\/"},{"key":"11_CR14","unstructured":"Sunspider javascript benchmark, \n                    \n                      http:\/\/www.webkit.org\/perf\/sunspider\/sunspider.html"},{"key":"11_CR15","unstructured":"Acid3 benchmark, \n                    \n                      http:\/\/www.webstandards.org\/action\/acid3\/"},{"key":"11_CR16","unstructured":"Kraken benchmark, \n                    \n                      http:\/\/krakenbenchmark.mozilla.org\/index.html"},{"key":"11_CR17","doi-asserted-by":"crossref","unstructured":"Bandhakavi, S., King, S., Madhusudan, P., Winslett, M.: VEX: vetting browser extensions for security vulnerabilities. In: USENIX Security (2010)","DOI":"10.1145\/1995376.1995398"},{"issue":"9","key":"11_CR18","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1145\/1995376.1995398","volume":"54","author":"S. Bandhakavi","year":"2011","unstructured":"Bandhakavi, S., Tiku, N., Pittman, W., King, S.T., Madhusudan, P., Winslett, M.: Vetting browser extensions for security vulnerabilities with vex. Communications of the ACM\u00a054(9), 91\u201399 (2011)","journal-title":"Communications of the ACM"}],"container-title":["Lecture Notes in Computer Science","Information Security Practice and Experience"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-29101-2_11.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T07:23:32Z","timestamp":1620113012000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-29101-2_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642291005","9783642291012"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-29101-2_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}